Vulnerability Name: | CVE-2019-0053 (CCN-163569) | ||||||||||||
Assigned: | 2018-10-11 | ||||||||||||
Published: | 2019-07-10 | ||||||||||||
Updated: | 2023-03-23 | ||||||||||||
Summary: | |||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-0053 Source: sirt@juniper.net Type: Third Party Advisory, VDB Entry sirt@juniper.net Source: XF Type: UNKNOWN juniper-cve20190053-bo(163569) Source: CCN Type: Juniper Networks Security Bulletin JSA10947 Junos OS: Insufficient validation of environment variables in telnet client may lead to stack-based buffer overflow (CVE-2019-0053) Source: sirt@juniper.net Type: Vendor Advisory sirt@juniper.net Source: sirt@juniper.net Type: Issue Tracking, Third Party Advisory sirt@juniper.net Source: sirt@juniper.net Type: Mailing List, Third Party Advisory sirt@juniper.net Source: sirt@juniper.net Type: Third Party Advisory sirt@juniper.net Source: sirt@juniper.net Type: Exploit, Third Party Advisory, VDB Entry sirt@juniper.net Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-0053 | ||||||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |